Your search for 3513 returns 4112 document(s) |
Computer networking/ edited by Robert P. Blanc |
Author: Blane, Robert F. ed.; | Call Number: 004.6 Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer networking essentials: an essentials guide to understanding networking theory, implementation, and interoperability/Debra Litlejohn Shinder |
Author: Shinder, Debra Littlejohn; | Call Number: 004.6 Shi c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network fundamentals CCNA exploration labs and study guide |
Author: Rufi, Antoon W.; | Call Number: 004.607 6 Ruf n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data communications and networking 5th ed. |
Author: Forouzan, Behrouz A.; | Call Number: 004.6 For d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analisis kinerja layanan jaringan komputer untuk manajemen ketersediaan: studi kasus PT CNAF |
Author: Cipto Wibowo; | Call Number: KA-606 (softcopy KA-602) MAK KA-265 | Edition: 2014 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer forensics: computer crime scene investigation |
Author: Vacca, John R.; | Call Number: 363.259 68 Vac c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer forensics: computer crime scene investigation |
Author: Vacca, John R.; | Call Number: 363.259 68 Vac c | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Sistem pengenalan wajah 3D sudut vertikal dan sudut horizontal menggunakan metode nearest feture line pada kombinasi ruang eigen double view based/ Christian K.F. Daeli |
Author: Christian K.F Daeli; | Call Number: SK-0642 (Softcopy SK-123) Source Code SK-109 | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer organization: hardware/software 2nd ed./ George W. Gorline |
Author: Gorsline, George W.; | Call Number: 004 Gor c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Enterprise security architecture: a business-driven approach |
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|